Friday, 28 July 2017

Whats-App Discussion SBI/IBPS PO Computer 28/7/2017(Friday)

Q1: Who invented Compact Disc?
Ans: James T Russel



Q2 .'Weaving The Web' was written by.....?
Ans2. Tim Berners-Lee



Q3. Which of the following is the type of software that has self-replicating software that causes damage to files and system?
A) Viruses
B) Trojan horses
C) Bots
D) Worms
E) Backdoors
Ans3. Worms

Explanation: A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.



Q4: In MS-Word, what is the maximum font size you can apply for any character?
Ans: 1638



Q5: Which of the following is a cookie that is automatically recreated after being deleted?
A. Super Cookie
B. HTTP only Cookie
C. Zombie Cookie
D. Session Cookie
E. None of these
Ans: Zombie Cookie 



Q6: The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is ____
A) Phishing
B) Eavesdropping
C) Scams
D) Exploits
E) Denial of service
Ans: Eavesdropping

Explanation:
Network eavesdropping is a network layer attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information.This type of network attack is generally one of the most effective as a lack of encryption services are used. It is also linked to the collection of metadata.



Q7: _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Ans: Keylogging



Q8: The database administrator’s function in an organization is _____.
A) to be responsible for the more technical aspects of managing the information contained in organizational databases
B) to be responsible for the executive level aspect of decisions regarding the information management
C) to show the relationship among entity classes in a data warehouse
D) to define which data mining tools must be used to extract data
E) None of these
Ans: Option A(to be responsible for the more technical aspects of managing the information contained in organizational databases) 

Explanation: A database administrator is a person responsible for the design, implementation, maintenance and repair of an organization’s database. 



Q9:  One-way authentication is based on____.
A)  Possession of a secret (Password)
B)  Possession of an artifact
C)  Unique physiological or behavioral characteristics of the user 
D)  All of the above
E)  none of these
Ans: Option A(Possession of a secret (Password))

Explanation: One way or single factor authentication is the traditional security process that requires one of the following elements before granting access to the users. There are “something user have “(including keys or token cards) Something user know (including passwords) or something user are (including fingerprints, voiceprints or retinal scan like iris.



Q10: Which of the following device used ‘set of beads’ to represent the unit of data? 
(a) ENIAC
(b) EDVAC
(c) Abacus
(d) MARK-I
(e) None of these
Ans: (c) Abacus

No comments:

Post a Comment